U.S. patent application number 09/297032 was filed with the patent office on 2001-11-15 for method for controlling logging of wireless mobile components onto wireless base stations of universal mobile telecommunication systems, especially dect mobile components in dect base stations of cap specific telecommunication systems.
Invention is credited to BECKERS, MICHAEL, KAMPERSCHROER, ERICH, KORDSMEYER, MARTIN, SCHMITZ, GEORG.
Application Number | 20010041558 09/297032 |
Document ID | / |
Family ID | 7809509 |
Filed Date | 2001-11-15 |
United States Patent
Application |
20010041558 |
Kind Code |
A1 |
SCHMITZ, GEORG ; et
al. |
November 15, 2001 |
METHOD FOR CONTROLLING LOGGING OF WIRELESS MOBILE COMPONENTS ONTO
WIRELESS BASE STATIONS OF UNIVERSAL MOBILE TELECOMMUNICATION
SYSTEMS, ESPECIALLY DECT MOBILE COMPONENTS IN DECT BASE STATIONS OF
CAP SPECIFIC TELECOMMUNICATION SYSTEMS
Abstract
In order to re-log cordless mobile parts on at cordless base
stations of universal mobile telecommunication systems,
particularly DECT mobile parts at DECT base stations of
CAP-specific telecommunication systems, without great outlay the
stored, logon-specific data resulting from a preceding logon are
copied, the copied data are subsequently at least partly processed,
and the copied, at least partly processed data are stored as
re-logon-specific data.
Inventors: |
SCHMITZ, GEORG; (BOCHOLT,
DE) ; KAMPERSCHROER, ERICH; (HAMMINKELN, DE) ;
KORDSMEYER, MARTIN; (HORSTEL, DE) ; BECKERS,
MICHAEL; (BOCHOLT, DE) |
Correspondence
Address: |
Schiff Hardin & Waite
Patent Department
6600 Sears Tower
Chicago
IL
60606-6473
US
|
Family ID: |
7809509 |
Appl. No.: |
09/297032 |
Filed: |
April 21, 1999 |
PCT Filed: |
October 10, 1997 |
PCT NO: |
PCT/DE97/02323 |
Current U.S.
Class: |
455/411 ;
455/410 |
Current CPC
Class: |
H04M 2250/08 20130101;
H04M 1/727 20130101 |
Class at
Publication: |
455/411 ;
455/410 |
International
Class: |
H04M 001/66 |
Foreign Application Data
Date |
Code |
Application Number |
Oct 22, 1996 |
DE |
19643658.3 |
Claims
1. Method for controlling the logon of cordless mobile parts at
cordless base stations of universal mobile telecommunication
systems, particularly of DECT mobile parts at DECT base stations of
CAP-specific telecommunication systems, a) the cordless mobile
parts (PP) are logged on at the cordless base stations (FP) by
logon procedures sequencing over air interfaces according to an air
interface-specific protocol, b) logon-specific data are stored
given logon of the cordless mobile parts (pp), characterized in
that c) the stored, logon-specific data are copied such given
re-logon of the cordless mobile parts (pp) that the logon-specific
data are redundantly present; is d) the copied data are at least
partly processed during a re-logon procedure for modifying
access-specific parameters of the cordless mobile part (pp) that
belong to the data; e) the copied, at least partly processed,
re-logon-specific data are stored as new logon-specific data:
2. Method according to claim 1, characterized in that the re-logon
is initiated by the cordless base stations.
Description
[0001] In message systems with a message transmission link between
a message source and a message sink, transmission and reception
devices are employed for message processing and transmission,
whereby the message processing and message transmission can ensue
in a privileged transmission direction (simplex mode) or in both
transmission directions (duplex mode), the message processing is
analog or digital, the message transmission over the long-distance
transmission link is wire-bound or ensues wirelessly on the basis
of various message transmission methods FDMA (Frequency Division
Multiple Access), TDMA (Time Division Multiple Access) and/or CDMA
(Code Division Multiple Access)--for example according to radio
standards such as DECT, GSM, WACS or PACS, IS-54, PHS, PDC, etc.
[see IEEE Communications Magazine, January 1995, pages 50 through
57; D. D. Falconer et al., "Time Division Multiple Access Methods
for Wireless Personal Communication"].
[0002] "Message" is a higher-ranking term that stands both for the
denotational content (information) as well as for the physical
representation (signal). Different signal forms can occur despite
the same denotational content of a message--i.e., the same
information. Thus, for example, a message relating to a subject
matter can be transmitted
[0003] (1) in the form of an image,
[0004] (2) as spoken word,
[0005] (3) as written word,
[0006] (4) as encrypted word or image.
[0007] The type of transmission according to (1) . . . (3) is
thereby normally characterized by continuous (analog) signals,
whereas discontinuous signals (for example, pulses, digital
signals) generally arise in the type of transmission according to
(4).
[0008] Proceeding from this general definition of a message system,
the invention is directed to a method for controlling the logon of
cordless mobile parts at cordless base stations of universal
telecommunication systems, particularly DECT mobile parts at DECT
base stations of CAP-specific telecommunication systems according
to the preamble of patent claim 1.
[0009] WO 95/05040 shows and describes (FIGS. 3 through 8 with the
respectively appertaining description) a scenario for a "Universal
Mobile Telecommunication System" (UMTS), which is essentially
concerned with involving picocell-related cordless
telecommunication systems [for example (I): DECT systems;
[0010] Digital Enhanced Cordless Telecommunication, (see (1):
Nachrichtentechnik Elektronik 42 (1992 Jan./Feb., No. 1, Berlin,
DE, U. Pilger "Struktur des DECT-Standards", pages 23 through 29 in
combination with ETSI Publication ETS 300175-1 . . . 9, Oct. 1992;
(2): Telcom Report 16 (1993), No. 1, J. H. Koch, "Digitaler Komfort
fur schnurlose Telecommunication--DECT-Standard eroffnet neue
Nutzungsgebiete", pages 26 and 27; (3): tec 2/93--Das technische
Magazin von Ascom "Wege zur universellen mobilen
Telecommunication", pages 35 through 42; (4): Philips
Telecommunication Review, Vol. 49, No. 3, Sept. 1991, R. J. Mulder,
"DECT, a universal cordless access system"; (5): WO 93/21719 (FIGS.
1 through 3 with appertaining description); and (II): DECT/GAP
systems; Generic Access Profiles (see ETSI Publication prETS
3000444, April 1995, Final Draft)] in to a higher-ranking network
infrastructure [for example ISDN, PSTN, GSM and/or satellite
networks; Integrated Services Digital Network, (see the publication
"Nachrichtentechnik Elektronik, Berlin 41-43, Part: 1 through 10,
P1: (1991) No. 3, pages 99 through 102; P2: (1991) No. 4, pages 138
through 143; P3: (1991) No. 5, pages 179 through 182 and No. 6,
pages 219 through 220; P4: (1991) No. 6, pages 220 through 222 and
(1992) No. 1, pages 19 through 20; P5: (1992) No. 2 pages 59
through 62 and (1992) No. 3, pages 99 through 102,; P6. (1992) No.
4, pages 150 through 153; P7: (1992) No. 6, pages 238 through 241;
P8: (1993) No. 1, pages 29 through 33; P9: (1993) No. 2, pages 65
through 97 and (1993) No. 3, pages 129 through 135; P10; (1993) No.
4, pages 187 through 190;") Public Switched Telecommunication
Network, Global System for Mobile Communication (see Informatik
Spektrum 14 (1991) June, No. 3, Berlin, DE, A. Mann, "Der
GSM-Standard--Grundlage fur digitale europische Mobilfunknetze",
pages 137 through 152)] for accesses (see ETSI Publication "CTM
Access Profile (CAP)" prETS 30, September 1996) under CTM points of
view (Cordless Terminal Mobility; see ETSI Publications (1): "IN
Architecture and Functionality for the support of CTM", Draft
Version 1.10, September 1995; (2): "Cordless Terminal Mobility
(CTM)--Phase 1, Service Description", Draft DE/NA-010039, Version 6
Oct. 2, 1995). According to patent claim 1, this can be achieved by
a DECT base station fashioned as DECT repeater. In a universal
mobile telecommunication system, DECT is mainly understood as a
"network access technology" for mobile communication services (see
publication (presentation) of A. Elberse, M. Barry, G. Fleming on
the topic, "DECT Data Services--DECT in Fixed and Mobile Networks",
Jun. 17/18 1996, Hotel Sofitel, Paris, pages 1 through 12 and
Summary) and not as a network.
[0011] WO 94/10785 discloses a method for the interconnection of
transmission and reception devices of a cordless communication
system to form a communication-capable unit, whereby cordless
mobile parts are logged on at cordless base stations by logon
procedures sequencing via air interfaces according to an air
interface-specific protocol, and whereby logon-specific data are
stored in the cordless mobile parts during this logon (FIGS. 4
through 12 with the respectively appertaining FIG.
description).
[0012] In the framework of the CTM access profile (CAP)
standardized by ETSI, it is intended that the fixed part (Fixed
Part; for example the DECT base station) can, as needed, modify
access authorization-specific parameters [for example, the IPUI
identification (International Portable User Identification; see
ETSI Publication ETS 300175-6, October 1992, Ch. 6.2), the PARK
identifier (Portable Access Rights Key; see ETSI Publication ETS
300175-6, October 1992, Ch. 6.1) and the PLI identifier (Park
Length Indicator; see ETSI Publication ETS 300175-6, October 1992,
Ch. 6.1)] that are stored in a non-volatile memory (for example,
EEPROM) in the mobile part (Portable Part PP; for example, the DECT
mobile part) already logged on at the fixed part (see WO 94/10785).
To that end, the fixed part initiates a re-logon procedure
(re-subscription procedure) according to FIG. 1. According to the
DECT standard (see ETSI Publication 300175-5, October 1992), the
sub-procedures shown in FIG. 1, "authentification of the fixed
part" (see ETSI Publication ETS 300175-5, October 1992, Ch.
13.3.3), "key allocation" (see ETSI Publication ETS 300175-5,
October 1992, Ch. 13.6) and "authentification of the mobile part"
(see ETSI Publication ETS 300175-5, October 1992, Ch. 13.3.1), are
thereby implemented with the MM messages recited in ETS 300175-5,
October 1992, Ch. 6.3.6 With the sub-procedure "authentification of
the fixed part", the fixed part FP must legitimize or,
respectively, identify itself as fixed part that is authorized to
initiate a re-subscription procedure. What this is particularly
intended to prevent is that unauthorized persons ("hackers") can
initiate a re-subscription procedure from an arbitrary fixed part.
The access rights according to ETS 300175-5, October 1992, Ch.
13.5.1 are assigned with the sub-procedures of "key allocation" and
"authentification of the mobile part".
[0013] Up to now, it was standard that the data (for example, the
afore-mentioned identifications) stored in the preceding logon were
all deleted--both in the fixed part FP as well as in the mobile
part PP. The result thereof was that the logon procedure, i.e. all
sub-procedures shown in FIG. 1, had to be completely repeated.
[0014] EP-0 336 079 A2 and GB-2 289 828 A respectively disclose a
method for controlling the logon of cordless mobile parts at
cordless base stations of universal telecommunication systems
wherein a personal identifier (password, ID) stored in the cordless
mobile part can be modified, in particular, on demand by the
cordless base station.
[0015] DE-195 42 732 A1 discloses a method for recognizing misuse
of an access authorization, particularly in mobile radiotelephone
systems, whereby variable data transmitted for identification that
are transmitted before every interaction are at least partially
overwritten by new data in every interaction, said new data being
generated by an evaluation means and being transmitted to a storage
medium and being required as new key word for the identification by
the evaluation/decision means in the next interaction.
[0016] The object underlying the invention is comprised in
re-subscribing cordless mobile parts at cordless base stations of
universal mobile telecommunication systems, particularly DECT
mobile parts at DECT base stations of CAP-specific
telecommunication systems, without great outlay.
[0017] Proceeding from the method defined in the preamble of patent
claim 1, this object is achieved by the features recited in the
characterizing part of patent claim 1.
[0018] The idea underlying the invention is comprised in
re-subscribing cordless mobile parts at cordless base stations of
universal mobile telecommunication systems, particularly DECT
mobile parts at DECT base stations of CAP-specific
telecommunication systems, without great outlay in that the stored,
logon-specific data resulting from a preceding logon are copied,
the copied data are subsequently at least partly processed, and the
copied, at least partly processed data are stored as
re-subscription-specific data.
[0019] Further advantageous developments of the invention are
recited in other the subclaims. [sic]
[0020] An exemplary embodiment of the invention is explained on the
basis of FIG. 2.
[0021] Proceeding from FIG. 1, FIG. 2 shows how, following the
sub-procedure "authentification of the fixed part and preceding the
sub-procedure "key allocation", the mobile part PP copies the data
from the preceding logon procedure stored in the non-volatile
memory (for example, the EEPROM) into a volatile logon memory for
modifications by the fixed part FP.
[0022] In addition to the access authorization-specific parameters
(PARK, IPUI, PLI, etc.) already mentioned with the description of
FIG. 1, these data also include an AC word (authentification code;
see ETSI Publication ETS 300175-7, October 1992, Ch. 4.4.3.1.,
Point 3)) fashioned as PIN word to be input by the user of the
mobile part PP upon initial logon or, respectively, a UAK word
(User Authentification Key; see ETSI Publication ETS 300175-7,
October 1992, Ch. 4.4.3.1., Point 1) and FIG. 1 in Ch. 4.5., 4.6.
and 5.) calculated from the AC word. The starting situation given
an initial logon of the mobile part PP at the fixed part FP is that
the AC word is stored in the fixed part FP as system-specific PIN
word (relating to the mobile and fixed part) and is input and
stored in the mobile part PP.
[0023] When the UAK word according to ETSI Publication ETS
300175-7, October 1992, FIG. 1 in Ch. 4.5., 4.6. and 5 has been
calculated in the fixed part FP as well as in the mobile part PP in
the preceding logon (for example, the initial logon), for example
after the input and storing of the AC word due to the message
"KEY_ALLOCATE" [see ETSI Publication ETS 300175-5, October 1992,
Ch. 13.6] transmitted from the fixed part FP to the mobile part PP,
the stored AC word is replaced by the UAK word in the fixed part FP
and mobile part PP. When, by contrast, the UAK word is not
calculated--which is also alternatively possible--, then the AC
word remains stored unmodified in the fixed part FP and mobile part
PP. When, following the initial logon (preceding logon), the fixed
part FP starts a re-logon procedure (re-subscription procedure)
according to FIG. 2 and when, differing from the comments about
FIG. 1, the stored are neither deleted in the fixed part FP and
mobile part PP nor, differing from FIG. 2, are copied in the mobile
part PP, then a partial modification by the fixed part FP of a
datum non-volatilely stored in the mobile part PP retained in the
volatile memory that is pursued, in particular, with the
re-subscription procedure leads, taking this modification in the
non-volatile memory of the mobile part PP into consideration, to
the loss of all data previously stored in the non-volatile memory.
In order to prevent this, the dataset resulting from the preceding
logon and stored in the non-volatile memory of the mobile part
PP--as already mentioned above--is copied into the volatile memory
for modifications intended by the fixed part with the
re-subscription procedure.
[0024] In that the data are redundantly present in the meantime,
the fixed part FP can now designationally modify the initially
indicated data (identifications) without having to repeat all
sub-procedures--as given the procedure according to FIG. 1. When
the data have been correspondingly modified by the fixed part FP
after the re-logon procedure, then the content of the logon memory
(preferably a data mix from two successive logon procedures) is
transferred into the non-volatile memory (for example, the
EEPROM).
* * * * *